Results 261 to 270 of about 11,266 (293)
Some of the next articles are maybe not open access.

Key pre-distribution in wireless sensor networks using multivariate polynomials

2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., 2005
Key agreement in sensor networks is a dif- ficult problem because of resource constraints of the sensors. The classical approaches used in general networks are impractical in sensor networks. Hence, several key pre-distribution schemes are proposed. In this paper, we propose a hypercube multivariate scheme (HMS) that is a threshold-based scheme. In the
F. Delgosha, F. Fekri
openaire   +1 more source

An improved distributed key revocation scheme in wireless sensor networks

2008 11th IEEE International Conference on Communication Technology, 2008
A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment ...
null Jun Zhou, null Mingxing He
openaire   +1 more source

Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution

2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, 2011
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network ...
Kevin Henry, Douglas R. Stinson
openaire   +1 more source

An Improved Distributed Key Management Scheme in Wireless Sensor Networks

2009
A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users' joining and revocation operations by using secret sharing techniques and Modified Blom's symmetric key establishment mechanism.
Jun Zhou, Mingxing He
openaire   +1 more source

ON MAXIMUM KEY POOL SIZE FOR A KEY PRE-DISTRIBUTION SCHEME IN WIRELESS SENSOR NETWORKS

International Journal of Computers and Applications, 2009
AbstractBootstrapping secure communication among sensor nodes deployed in hostile environments is an important and challenging problem. A common approach to solve this problem is to use a key predistribution scheme in which each sensor node is assigned a subset of keys selected from some key pool. The resilience of a key pre-distribution scheme depends
N. Mittal, T.R. Belagodu
openaire   +1 more source

Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network

2007 IEEE Wireless Communications and Networking Conference, 2007
In this paper, we develop and analyze a new self-healing key distribution scheme with revocation capability, scalable to very large groups in unreliable ad hoc wireless environment. The main emphasis of our proposed scheme is that it has significant improvement in terms of both storage and communication overhead compared to the previous works.
Ratna Dutta, Sourav Mukhopadhyay
openaire   +1 more source

On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009
Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise and revelation. Therefore, establishing secure communication in such networks is of great importance necessitating utilization of efficient key distribution schemes.
H. Shafiei   +4 more
openaire   +1 more source

Key pre-distribution based secure backbone formation in wireless sensor networks

2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008
Security is a prime concern in large-scale wireless sensor networks used for collaborative mission critical applications. A backbone network in the form of a cluster tree can enhance upper layer functions such as routing, broadcasting, in-network query processing and network management.
H. M. N. Dilum Bandara   +2 more
openaire   +1 more source

Three-dimensional Key Distribution Scheme in Wireless Sensor Networks

2022 18th International Conference on Mobility, Sensing and Networking (MSN), 2022
Wanqing Wu   +3 more
openaire   +1 more source

Distributed Key Establishment Scheme in Wireless Sensor Network

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007
Zhao Hong-Wei   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy